Previous

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

JISE Vol. 22 No.3  (May 2006)

JISE

 

SPECIAL ISSUE FOR SELECTED PAPERS FROM CVGIP

PAPERS

  1. Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain  
    Yen-Chung Chiu and Wen-Hsiang Tsai................pp.483-496
  2. Automatic White Balance for Digital Still Camera  

    Varsha Chikane and Chiou-Shann Fuh...............pp.497-509

  3. A Geometric Invariant Approach to Human Face Verification 
    Li-Wei He, Tsorng-Lin Chia and Chen-Kuei Yang...............pp.511-534

  4. BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain  
    Shi-Cheng Liu and Shinfeng D. Lin...............pp.535-543

  5. Binarization Method Based on Pixel-level Dynamic Thresholds for Change Detectin in Image Sequences  
    Hsu-Yung Cheng, Quen-Zong Wu, Kuo-Chin Fan and Bor-Shenn Jeng................pp.545-557

 

REGULAR SECTION

PAPERS

  1. A New Design for a Practical Secure Cookies System 
    Jong-Phil Yang and Kyung HYune Rhee...............pp.559-571

  2. A Classification Tree Based on Discriminant Functions 
    Been-Chian Chien, Jung-Yi Lin and Wei-Pang Yang...............pp.573-594

  3. Building and Using Object-Oriented Frameworks for CAD Rapid Prototyping 
    Hewijin Christine Jiau and Kuo-Feng Ssu...............pp.595-609

  4. Efficient One-time Signature Schemes for Steam Authentication  
    Yongsu Park and Yookun Cho...............pp.611-624

  5. TeMeFr: Towards a Reuse-Based Development for Conference-Oriented Telemedicine Systems 
    Hewijin Christine Jiau, Jinghong Cox Chen, Kuo-Feng Ssu...............pp.627-645

  6. Fast Octree Construction Endowed with an Error Bound Controlled Subdivision Scheme   
    Hong-Long Chou and Zen Chen...............pp.641-657

  7. Profile-Based Lifetime Determination Schemes for Mobility Management in HMIPv6[  ]
    Sun Ok Yang, SungSuk Kim and Chong-Sun Hwang...............pp.659-674

  8. Storage Efficient Key Management Technique for Secure Multicasting[  ]
    Ganapathi Padmavathi and Samukutty Annadurai...............pp.675-689

 

SHORT PAPERS

 

  1. Authentication Protocols Using Hoover-Kausik's Software Token 
    Wei-Chi Ku and Hui-Lung Lee...............pp.691-699

  2. Semi-fragile Image Authentication Using Real Symmetric Matrix 
    Ching-Tang Hsieh, Yeh-Kuang Wu, Chyi-Jang Lee and Hong-Yu Chen...............pp.701-712